What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds known exploited vulnerability to its catalog
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing rapid remediation of Vulnerabilities…
-
Several vulnerabilities in Google Chrome could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-023ISSUE DATE(S):03/13/2026PREVIEW:Several vulnerabilities have been discovered in Google Chrome, the most serious of which could allow the execution of arbitrary code. Successful exploitation…
-
CISA adds five known exploited vulnerabilities to its catalog
CISA has added five new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2017-7921 Multiple Hikvision Products Improper…
-
Multiple vulnerabilities in Google Android operating system could allow remote code execution
Several vulnerabilities have been discovered in the Google Android operating system, the most serious of which could allow remote code execution in the context of…













